Blog Archives

Taking Your Devices with You?

Traveling for business or personal now means many of us take two, three or more devices with us on a trip.  Many of us will have a phone and a computer like device (Ipad, Surface, Laptop, Tablet) and maybe a reading device (Nook or Kindle), too.
Travel Tips:

Password.  Each device is loaded with data and much [Read More]

Posted in Saving Time, Security

Be Thankful

Have a Safe and Happy Thanksgiving for those in the USA. Our American Holiday is a reminder to be thankful, especiallywhen people start something new and it is successful.   Here are some inspirational quotes to help you get in the holiday mood:
 “An optimist is a person who starts a new diet on Thanksgiving Day.” ~Irv [Read More]

Posted in Business Improvement, Security

Voicemail Virus Email – Ransomware

I want to give a little reminder/warning about a new virus that has been going around via email since two people I know have fallen for this email and now have a virus. One of them got a new ransomware virus.  First a reminder about detecting spam emails.

The email is from some one or some [Read More]

Posted in Security

Preventing Employee Theft

Did you know that 95% of business experience employee theft? It’s a horrifying feeling when your business experiences theft from the inside. The feelings of anger and guilt can eat away at you.
Preventing employee theft can be time consuming, but the costs and time involved truly outweigh the costs of having to recover from the theft. Here are a few ideas to keep your businesses money flowing where it should be.
• Policies and procedures
• Alterations of ANY photocopied documents
• Employees in close relationships with suppliers
• Inventory (including office supplies)
• Checks written to cash

Posted in Business Management, Business Planning, Employee Management, Financial, Goals, Organization, Security, Uncategorized

Identity Theft

Nothing is more annoying than having your credit card shut down for fraud, especially if it’s a business card. In this day and age it is getting easier and easier for criminals to clone or steal your information to use it for their own gain. So how do you protect yourself from becoming a victim?

The following tips will help you to protect your business, your employees, and your customers from becoming victims of identity theft.

  • Create and follow a security strategy in your business plan.
  • Designate a top level manager to implement the plan if you become a victim.
  • If you need assistance in designing a plan, enlist an expert.
  • Protect your business records on file with the Ohio Secretary of State by taking the following steps:
  • Assign a trusted person to be responsible for maintaining and monitoring your business record with the Secretary of State.
  • Sign up for e-mail notification about changes to your business record.
  • Sign up for Secure Business Filing.

Posted in Business Management, Employee Management, Financial, Security, Uncategorized

Get Your Fax Straight

If you own a fax machine chances are you have received numerous amounts of offers from companies wanting to sell you vacations, excel classes and employee handbooks. More than likely you ignore them or call the number to be removed from their list.

It’s easy to ignore the outrageous prices when you know it’s a scam, but what about the scam that comes in the form of an official looking invoice to renew your domain name?

Domain name renewal scams can work in one of two ways. You might be sent an invoice for a domain name that is very similar to your current domain name – the scammer hopes that you don’t notice the difference and just pay the invoice.

Alternatively, you could be sent a letter that looks like a renewal notice for your actual domain name, but is from a different company to the one you have previously used to register your domain name.

So how do you protect your business from falling for the domain name scam?

Posted in Financial, Security, Uncategorized

Emergency Preparedness

Are you and your staff prepared for an emergency? Sure, you have your emergency evacuation paper taped to different areas of your office, but what if other situations arrive? Emergency planning and training directly influence the outcome of an emergency situation. Having a written procedure and plan can mean the difference between chaos and control.

I found some information on the National Fire Protection Association web site. Here are a few items from their list:

  • Emergency Escape Procedures and Emergency Escape Route Assignments. 
  • Procedures for Employees Who Remain on Site after the Alarm Sounds
  • Procedures to Account for Employees
  • Procedures for Reporting Emergencies.
  • Contacts for Further Information
  • Alarm Systems
  • Procedure for media attention

Posted in Business Planning, Employee Management, Security, Uncategorized

It Is Not Just A Phone Any More

What do you do if your cell phone is lost or stolen? You might just write it off and go buy a new one, after all it is just a cell phone.   Unfortunately, it isn’t just a cell phone any more as we tend to keep bank info, his credit card info, emails and other personal information. A criminal would have access to all that info and the crime just turned into identity theft.

We tend to forget we get a special price for a phone when we sign up for a two year contract. That $200 phone is actually $550. Which is a hefty price to pay for just a cell phone. But fear not, there are things you can do to protect yourself and get your phone back with a little bit of planning and a single app.

 

Posted in Security

Hacked Website. Who’s Responsible?

An interesting question was ask to me the other day.

When a website is hacked/compromised who is responsible for fixing it/paying for it to be fixed?

From the customers standpoint the answer is clear. The web designer has to cover it. But from the standpoint of a web designer, the answer is not that clear.

There are many variables due to contracts, situations, and lack of knowledge. So who is responsible for fixing it/paying for it to be fixed?

Some of the variables are:

  • Code
  • Servers
  • Software
  • Users and their passwords
  • Last updates
  • Contracts 

What are you doing right now to protect your website? Let us know what works for you.

Posted in Security

Sending Mass Emails

I don’t have to tell you that email spam is still a huge problem. I receive more spam in a day than good email in a week. Part of the spam comes from other people’s lack of knowledge when handling email addresses. A few times a month I receive a mass email from fellow business [Read More]

Posted in Business Improvement, Customer Service & Culture, Security
Bear